Movatterモバイル変換


[0]ホーム

URL:


US20250005150A1 - Generating and deploying phishing templates - Google Patents

Generating and deploying phishing templates
Download PDF

Info

Publication number
US20250005150A1
US20250005150A1US18/344,733US202318344733AUS2025005150A1US 20250005150 A1US20250005150 A1US 20250005150A1US 202318344733 AUS202318344733 AUS 202318344733AUS 2025005150 A1US2025005150 A1US 2025005150A1
Authority
US
United States
Prior art keywords
email
test
phishing
email messages
subset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US18/344,733
Inventor
Lokesh Vijay Kumar
Poornima Bagare Raju
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Capital One Services LLC
Original Assignee
Capital One Services LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Capital One Services LLCfiledCriticalCapital One Services LLC
Priority to US18/344,733priorityCriticalpatent/US20250005150A1/en
Assigned to CAPITAL ONE SERVICES, LLCreassignmentCAPITAL ONE SERVICES, LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: KUMAR, LOKESH VIJAY, RAJU, POORNIMA BAGARE
Publication of US20250005150A1publicationCriticalpatent/US20250005150A1/en
Pendinglegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

In some implementations, a phishing test engine may receive a set of email messages that are associated with a set of users and with an indication of legitimacy. The phishing test engine may perform clustering on the set of email messages to identify a subset of similar email messages and a subset of users. The phishing test engine may generate an email template based on the subset of similar email messages and including an indicator of phishing. The phishing test engine may generate, from the email template, a test email message addressed to a user in the subset of users and may transmit the test email message to the user. The phishing test engine may receive an indication of an interaction with the test email message and may update a policy associated with the set of users based on the indication of the one or more interactions.

Description

Claims (20)

What is claimed is:
1. A system for generating and deploying phishing templates, the system comprising:
one or more memories; and
one or more processors, communicatively coupled to the one or more memories, configured to:
receive a set of email messages that are associated with a set of users and that are associated with an indication of legitimacy;
perform clustering on the set of email messages to identify a subset of similar email messages from the set of email messages and a subset of users from the set of users that are associated with the subset of similar email messages;
generate, for the subset of users, an email template based on the subset of similar email messages;
incorporate, into the email template, at least one indicator of phishing;
generate, from the email template, a test email message addressed to at least one user in the subset of users and based on at least one email message in the subset of similar email messages;
transmit the test email message to the at least one user;
receive an indication of one or more interactions with the test email message; and
transmit a report based on the indication of the one or more interactions.
2. The system ofclaim 1, wherein the indication of legitimacy is associated with junk or spam.
3. The system ofclaim 1, wherein the one or more processors, to generate the email template, are configured to perform at least one of:
determining a logo to include in the email template;
generating a subject line for the email template; or
determining a layout for a body of the email template.
4. The system ofclaim 1, wherein the one or more processors, to generate the test email message, are configured to perform at least one of:
inserting content into a subject line of the test email message based on at least one email message, in the subset of similar email messages, associated with the at least one user; or
inserting content into a body of the test email message based on the at least one email message associated with the at least one user.
5. The system ofclaim 1, wherein the one or more processors are configured to:
update a trust score, associated with a sender, based on the indication of the one or more interactions.
6. The system ofclaim 1, wherein the one or more interactions include opening the test email message, discarding the test email message, accessing a resource that is hyperlinked in the test email message, or replying to the test email message.
7. The system ofclaim 1, wherein the at least one indicator of phishing includes a suspicious hyperlink, a suspicious sender, or a suspicious phone number.
8. The system ofclaim 1, wherein the one or more processors, to transmit the report, are configured to perform at least one of:
transmitting the report to the at least one user; or
transmitting the report to an administrator associated with the set of email messages.
9. A method of generating and deploying phishing templates, comprising:
receiving a set of email messages that are associated with a set of users;
performing clustering on the set of email messages to identify a subset of similar email messages from the set of email messages and a subset of users from the set of users that are associated with the subset of similar email messages;
generating, for the subset of users, an email template based on the subset of similar email messages;
incorporating, into the email template, at least one indicator of phishing;
generating, from the email template, a test email message addressed to at least one user in the subset of users;
transmitting the test email message to the at least one user;
receiving an indication of one or more interactions with the test email message; and
updating a policy associated with the set of users based on the indication of the one or more interactions.
10. The method ofclaim 9, further comprising:
applying a machine learning model to the subset of similar email messages,
wherein the email template is generated using output from the machine learning model.
11. The method ofclaim 9, wherein performing the clustering on the set of email messages comprises:
applying a machine learning algorithm to map the set of email messages to a plurality of clusters based on linguistic similarities,
wherein the subset of similar email messages is included in a single cluster of the plurality of clusters.
12. The method ofclaim 9, wherein updating the policy comprises at least one of:
blocking a sender associated with the test email message; or
applying a label to future email messages from a sender associated with the test email message.
13. The method ofclaim 9, wherein the set of email messages are associated with an indication of legitimacy.
14. The method ofclaim 9, further comprising:
updating a trust score based on the indication of the one or more interactions,
wherein the policy is updated based on the updated trust score.
15. A non-transitory computer-readable medium storing a set of instructions for generating and deploying phishing templates, the set of instructions comprising:
one or more instructions that, when executed by one or more processors of a device, cause the device to:
receive an email template, associated with a set of users, that was generated based on a set of email messages associated with an indication of legitimacy and that includes at least one indicator of phishing;
generate, from the email template, a test email message addressed to at least one user in the set of users;
transmit the test email message to the at least one user;
receive an indication of one or more interactions with the test email message; and
transmit a report based on the indication of the one or more interactions.
16. The non-transitory computer-readable medium ofclaim 15, wherein the one or more instructions, when executed, cause the device to:
select a training, from a plurality of possible trainings, based on the indication of the one or more interactions; and
transmit a message, to the at least one user, indicating the selected training.
17. The non-transitory computer-readable medium ofclaim 15, wherein the one or more instructions, when executed, cause the device to:
determine a category for the one or more interactions,
wherein the report indicates the category for the one or more interactions.
18. The non-transitory computer-readable medium ofclaim 15, wherein the one or more instructions, that cause the device to generate the test email message, cause the device to:
extract a phrase from a recent email message, in the set of email messages, associated with the at least one user; and
insert the phrase into a body of the test email message.
19. The non-transitory computer-readable medium ofclaim 15, wherein the one or more instructions, that cause the device to generate the test email message, cause the device to:
select a phase, from a plurality of possible phrases, to include in the test email message, based on a recent email, in the set of email messages, associated with the at least one user.
20. The non-transitory computer-readable medium ofclaim 15, wherein the one or more instructions, when executed, cause the device to:
generate, from the email template, an additional test email message addressed to at least one additional user in the set of users;
transmit the additional test email message to the at least one additional user;
receive an additional indication of one or more interactions with the additional test email message; and
transmit an additional report based on the additional indication.
US18/344,7332023-06-292023-06-29Generating and deploying phishing templatesPendingUS20250005150A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US18/344,733US20250005150A1 (en)2023-06-292023-06-29Generating and deploying phishing templates

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US18/344,733US20250005150A1 (en)2023-06-292023-06-29Generating and deploying phishing templates

Publications (1)

Publication NumberPublication Date
US20250005150A1true US20250005150A1 (en)2025-01-02

Family

ID=94126087

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US18/344,733PendingUS20250005150A1 (en)2023-06-292023-06-29Generating and deploying phishing templates

Country Status (1)

CountryLink
US (1)US20250005150A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20250023913A1 (en)*2023-07-122025-01-16Cisco Technology, Inc.System and method for detecting malicious messages generated by a large language model (llm)

Citations (25)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20130031628A1 (en)*2011-07-292013-01-31International Business Machines CorporationPreventing Phishing Attacks
US20140020047A1 (en)*2012-07-162014-01-16Nicholas LiebmannCloud email message scanning with local policy application in a network environment
US20140120961A1 (en)*2012-10-262014-05-01Lookout, Inc.System and method for secure message composition of security messages
US8719940B1 (en)*2013-02-082014-05-06PhishMe, Inc.Collaborative phishing attack detection
US9223971B1 (en)*2014-01-282015-12-29Exelis Inc.User reporting and automatic threat processing of suspicious email
US9742803B1 (en)*2017-04-062017-08-22Knowb4, Inc.Systems and methods for subscription management of specific classification groups based on user's actions
US9749359B2 (en)*2015-07-222017-08-29Bank Of America CorporationPhishing campaign ranker
US20180159888A1 (en)*2016-10-312018-06-07KnowBe4, Inc.Systems and methods for an artificial intelligence driven smart template
US20190005428A1 (en)*2017-06-202019-01-03KnowBe4, Inc.Systems and methods for creating and commissioning a security awareness program
US20200135049A1 (en)*2018-10-262020-04-30Circadence CorporationMethod and system for evaluating individual and group cyber threat awareness
US20210075827A1 (en)*2019-09-052021-03-11Proofpoint, Inc.Dynamically Initiating and Managing Automated Spear Phishing in Enterprise Computing Environments
US20210152596A1 (en)*2019-11-192021-05-20Jpmorgan Chase Bank, N.A.System and method for phishing email training
US20210185080A1 (en)*2019-12-112021-06-17At&T Intellectual Property I, L.P.Social engineering attack prevention
US20210248229A1 (en)*2020-02-072021-08-12KnowBe4, Inc.Systems and methods for providing configurable responses to threat identification
US11128649B1 (en)*2019-03-062021-09-21Trend Micro IncorporatedSystems and methods for detecting and responding to anomalous messaging and compromised accounts
US20220006830A1 (en)*2020-07-022022-01-06Proofpoint, Inc.Modeling Simulated Cybersecurity Attack Difficulty
US20220116419A1 (en)*2019-01-172022-04-14IT-Seal GmbHMethod for the automated creation of a phishing document addressed to a predefined person
US20220279015A1 (en)*2021-02-262022-09-01ArmorBlox, Inc.Method for detecting financial attacks in emails
US20220400134A1 (en)*2021-06-142022-12-15Paypal, Inc.Defense against emoji domain web addresses
US11563767B1 (en)*2021-09-022023-01-24KnowBe4, Inc.Automated effective template generation
US11663353B1 (en)*2020-06-292023-05-30United Services Automobile Association (Usaa)Systems and methods for monitoring email template usage
US20230214925A1 (en)*2021-11-232023-07-06Strong Force TX Portfolio 2018, LLCTransaction platforms where systems include sets of other systems
US11757914B1 (en)*2017-06-072023-09-12Agari Data, Inc.Automated responsive message to determine a security risk of a message sender
US20240064063A1 (en)*2022-08-222024-02-22At&T Intellectual Property I, L.P.Trust labeling of call graphs for telecommunication network activity detection
US11928212B2 (en)*2020-06-152024-03-12Proofpoint, Inc.Generating simulated spear phishing messages and customized cybersecurity training modules using machine learning

Patent Citations (26)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20130031628A1 (en)*2011-07-292013-01-31International Business Machines CorporationPreventing Phishing Attacks
US20140020047A1 (en)*2012-07-162014-01-16Nicholas LiebmannCloud email message scanning with local policy application in a network environment
US20140120961A1 (en)*2012-10-262014-05-01Lookout, Inc.System and method for secure message composition of security messages
US8719940B1 (en)*2013-02-082014-05-06PhishMe, Inc.Collaborative phishing attack detection
US9223971B1 (en)*2014-01-282015-12-29Exelis Inc.User reporting and automatic threat processing of suspicious email
US9749359B2 (en)*2015-07-222017-08-29Bank Of America CorporationPhishing campaign ranker
US20180159888A1 (en)*2016-10-312018-06-07KnowBe4, Inc.Systems and methods for an artificial intelligence driven smart template
US9742803B1 (en)*2017-04-062017-08-22Knowb4, Inc.Systems and methods for subscription management of specific classification groups based on user's actions
US11757914B1 (en)*2017-06-072023-09-12Agari Data, Inc.Automated responsive message to determine a security risk of a message sender
US20190005428A1 (en)*2017-06-202019-01-03KnowBe4, Inc.Systems and methods for creating and commissioning a security awareness program
US20200135049A1 (en)*2018-10-262020-04-30Circadence CorporationMethod and system for evaluating individual and group cyber threat awareness
US20220116419A1 (en)*2019-01-172022-04-14IT-Seal GmbHMethod for the automated creation of a phishing document addressed to a predefined person
US11128649B1 (en)*2019-03-062021-09-21Trend Micro IncorporatedSystems and methods for detecting and responding to anomalous messaging and compromised accounts
US20210075827A1 (en)*2019-09-052021-03-11Proofpoint, Inc.Dynamically Initiating and Managing Automated Spear Phishing in Enterprise Computing Environments
US20210152596A1 (en)*2019-11-192021-05-20Jpmorgan Chase Bank, N.A.System and method for phishing email training
US20210185080A1 (en)*2019-12-112021-06-17At&T Intellectual Property I, L.P.Social engineering attack prevention
US20210248229A1 (en)*2020-02-072021-08-12KnowBe4, Inc.Systems and methods for providing configurable responses to threat identification
US11928212B2 (en)*2020-06-152024-03-12Proofpoint, Inc.Generating simulated spear phishing messages and customized cybersecurity training modules using machine learning
US20240176879A1 (en)*2020-06-152024-05-30Proofpoint, Inc.Generating Simulated Spear Phishing Messages and Customized Cybersecurity Training Modules Using Machine Learning
US11663353B1 (en)*2020-06-292023-05-30United Services Automobile Association (Usaa)Systems and methods for monitoring email template usage
US20220006830A1 (en)*2020-07-022022-01-06Proofpoint, Inc.Modeling Simulated Cybersecurity Attack Difficulty
US20220279015A1 (en)*2021-02-262022-09-01ArmorBlox, Inc.Method for detecting financial attacks in emails
US20220400134A1 (en)*2021-06-142022-12-15Paypal, Inc.Defense against emoji domain web addresses
US11563767B1 (en)*2021-09-022023-01-24KnowBe4, Inc.Automated effective template generation
US20230214925A1 (en)*2021-11-232023-07-06Strong Force TX Portfolio 2018, LLCTransaction platforms where systems include sets of other systems
US20240064063A1 (en)*2022-08-222024-02-22At&T Intellectual Property I, L.P.Trust labeling of call graphs for telecommunication network activity detection

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20250023913A1 (en)*2023-07-122025-01-16Cisco Technology, Inc.System and method for detecting malicious messages generated by a large language model (llm)

Similar Documents

PublicationPublication DateTitle
US12107886B2 (en)Systems and methods for intelligent phishing threat detection and phishing threat remediation in a cyber security threat detection and mitigation platform
US9906554B2 (en)Suspicious message processing and incident response
US10298602B2 (en)Suspicious message processing and incident response
Zhang et al.Two-stage ELM for phishing Web pages detection using hybrid features
US20210250369A1 (en)System and method for providing cyber security
US11399035B1 (en)Deep learning-based detection of phishing links
EP4416625A1 (en)Security vulnerability communication and remediation with machine learning
US11503059B2 (en)Predicting a next alert in a pattern of alerts to identify a security incident
US20190166150A1 (en)Automatically Assessing a Severity of a Vulnerability Via Social Media
EP3699796B1 (en)Message report processing and threat prioritization
US20250005150A1 (en)Generating and deploying phishing templates
Gontla et al.A Machine Learning Approach to Identify Phishing Websites: A Comparative Study of Classification Models and Ensemble Learning Techniques.
Gattani et al.Comparative analysis for email spam detection using machine learning algorithms
Jan et al.Semi-supervised labeling: a proposed methodology for labeling the twitter datasets
NaikModelling enhanced phishing detection using XGBoost
US20250069172A1 (en)Targeted anti-scam education and feedback
GanesanDetection of Phishing Websites Using Classification Algorithms
US20250307065A1 (en)Automated remediation of cloud platform errors
US20230359711A1 (en)Processing an input stream of a user device to facilitate security associated with an account of a user of the user device
US20250225429A1 (en)Using machine learning to determine data quality rules
RU2778381C2 (en)Method and system for determining the spam prediction error parameter
US20250217262A1 (en)Software platform health analysis
US20250139187A1 (en)Automatically generating and modifying style rules
US12174900B2 (en)Automatic updates to instruction documents using crowdsourcing
US20250278485A1 (en)Ai-based file maliciousness classification with an explanation of reasoning

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:CAPITAL ONE SERVICES, LLC, VIRGINIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KUMAR, LOKESH VIJAY;RAJU, POORNIMA BAGARE;REEL/FRAME:064133/0427

Effective date:20230628

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION COUNTED, NOT YET MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED


[8]ページ先頭

©2009-2025 Movatter.jp